Start with Ledger — Your Secure Crypto Journey Begins Here

A straightforward onboarding guide to set up your hardware wallet, secure your recovery phrase, and manage crypto safely.

Why use a hardware wallet?

Hardware wallets keep the private keys that control your cryptocurrency offline, away from internet threats such as phishing, malware, and remote hacks. Using a hardware device gives you full control of your funds: private keys never leave the device, and transactions must be signed in hardware.

What you'll need

  • Your hardware device and original packaging.
  • The recovery sheet that came with the device (or another secure backup method).
  • A computer or mobile device with a compatible connection.
  • A private location to perform setup without interruption.

Step 1 — Unbox and verify

Check for tamper-evident seals and confirm the device model and serial number match the documentation. If anything looks tampered with, stop and contact official support.

Step 2 — Power up and choose a PIN

Connect the device and follow on-screen prompts to select a PIN. Choose a PIN you can remember but that is difficult for others to guess. Do not store the PIN in plain text or photographs.

Step 3 — Generate and secure your recovery phrase

The device will display a 24-word recovery phrase. This phrase is the master backup that can recreate access to your accounts if the device is lost or damaged. Write the words on the provided recovery sheet and store it offline and securely. Avoid digital copies like photos, cloud backups, or notes.

[ write your 24-word recovery phrase here — keep offline and secure ]

Step 4 — Install the companion app

Download and install the official companion application from the manufacturer’s verified source. Use the app to add accounts and manage supported cryptocurrencies. Only install software from trusted sites or official app stores.

Step 5 — Add accounts and receive a test transaction

Add accounts for the currencies you use. Generate a receiving address and send a small test amount first — always verify addresses on both the app and the device before sending significant funds.

Security best practices

  • Never share your 24-word recovery phrase — no support representative will ever ask for it.
  • Keep firmware and apps updated via the official application.
  • Be alert to phishing: verify URLs and avoid clicking unexpected links.
  • Consider durable backups and an inheritance plan for long-term holdings.
  • Use passphrase protection only after you fully understand recovery implications.

Recovering your wallet

If your device is lost or damaged, you can restore accounts with the recovery phrase on a compatible device. Perform recovery only in trusted environments and double-check each entered word for accuracy.

Advanced features

Devices often support extras like staking, swaps, and third-party integrations. Explore advanced tools only after mastering core security practices and favor official, reputable integrations.

Last step checklist: device verified • PIN chosen • recovery stored • companion app installed • test transaction completed
Start setup